27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Muhammad Naveed<br />

5060 Udp Open |filtered<br />

20919 Udp Open | filtered<br />

Table 14: Aggressive OS scan results for BBC<br />

OS Name and Version Type Vendor OS Family OS Generation Accuracy of result<br />

Linux 2.6.9 – 2.6.18 General Purpose Linux Linux 2.6.X 93%<br />

6. Analysis of web servers of Pakistan<br />

Webservers of the most prominent organizations were analyzed. The choice of the webservers to be<br />

scanned is the organization very similar in their services and status to the web servers used to set the<br />

benchmark. The identity of the webservers in Pakistan is kept hidden because the reputation of the<br />

organization might be affected by mentioning their name. But the trend shown is very common, and<br />

one can himself scan the various webservers in Pakistan and will come to the same conclusion. Any<br />

randomly chosen organization will reveal almost the same level of security because the study<br />

analyzed the most well reputed organization, which should be first to implement security.<br />

6.1 Education and research institutions<br />

For analyzing webservers of education and research organization, webservers of reputable<br />

universities of the country were selected. Two web servers were scanned.<br />

The analysis of the first web server revealed that the web server is being used as a mail server, ftp<br />

server, DNS and database server and the ports for all of these services were opened. First of all<br />

webserver should only be used as webserver by such a large organization, and if they should be<br />

used, they should be behind the firewall. None of the port was found filtered which may means that<br />

the organization doesn’t even have a firewall installed to protect their web server. Firewall also<br />

doesn’t guarantee complete security, but it’s a first step to secure the server, intrusion detection and<br />

prevention should also be used to enhance security. But, here the case is worst, they don’t even<br />

bother to install firewall to protect their webserver or if they have installed it, they haven’t used it to<br />

protect their server. The scan also revealed that Microsoft Windows 2003 Server SP2 was installed<br />

on the server, which due to its extensive use is more vulnerable to attacks then Linux based OS. As<br />

the Table 18 shows the other possibilities (Windows XP and 2000) but one can judge that they cannot<br />

be installed on the webserver.<br />

Table 15: Scan details<br />

Scanned Web Server Hidden (because of Possible Objections)<br />

Scan Launching Time 2010-08-14 00:49 PKST<br />

Scan Type Slow Comprehensive Scan<br />

Scan Time 4214.71 seconds<br />

Raw packets sent 5090 (195.486KB)<br />

Raw packets received 191 (11.459KB)<br />

Table 16: Port scan results<br />

Port Protocol State Service<br />

20 Tcp Closed ftp-data<br />

21 Tcp Open ftp<br />

25 Tcp Open Smtp<br />

26 Tcp Open Smtp<br />

53 Tcp Open Domain<br />

80 Tcp Open http<br />

110 Tcp Open Pop3<br />

143 Tcp Open Imap<br />

443 Tcp Closed https<br />

465 Tcp Closed Smtps<br />

995 Tcp Open Pop3<br />

1038 Tcp Closed Unknown<br />

1039 Tcp Closed Unknown<br />

1434 Tcp Closed Ms-sql-m<br />

194

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!